Mom back in hospital & state police involved now

Got a frantic phone call this morning, apparently mom was at the police department going on about how her family is poisoning her as she doesn’t want to take her antibiotics and kidney medication. To be clear, not that anyone has been forcing her or otherwise doing anything other than filling her pill organizer with the exacting medication and dosages from the list the hospital provided.

She was in the ICU a few times by now with sepsis due to this exact thing, and it’s not the first time the police have been called out to the house by any means.

The paramedics were apparently at the house last night and verified the correct dosages and medications.

The situation has devolved into such a poor state that anyone who tries to caretake for mom could very well end up on the receiving end of a false police report, which makes it unwise to be in contact with her for fear of their own legal well being.

I’m personally concerned that I may be targeted due to my refusal to move home and mom’s insane rants about how terrible of a person I am for not doing so. It’s not that I don’t want to be there, I want to help mom.

I’m just not sure what else I could possibly communicate on this blog, or otherwise that doing so is not safe. Not for the abuse and name calling she dishes out, for the history of false police reports and insane rants about the government monitoring her, and the flying monkeys of people mom enlists who are financially motivated as she is loud about having money and actively demonizes her husband, children in her life.

There are genuinely good people out there reaching out, trying to help, thank you. It’s an impossible situation and my deepest apologies for not being as controlled and stoic about the situation in the pages of my blog as I could have been. Mike committed suicide, mom had her first melt down at my house and after several hours of insane rambling, the police carried her kicking and screaming out of my front door. Mom becomes very paranoid about people “keeping her in the hospital” and the insane rants and suspicion is shared widely.

If you think this specific situation is insane, it’s been what Mike, Jade and the family have been dealing with semi-privately for months now, and why Mike committed suicide.

It’s been a nightmare.

This is the.. 10th time I believe she’s been in the hospital. I’m questioning to myself, how does it get worse from here, and, how many days until she’s back home again doing the same thing?

Edit: going through previous posts to review, look at what I found from August?

Edit: and yet another one

annnddd another from July.

Just to be clear, I later learned that Mike indeed did the best he possibly could and he did try to keep her in the hospital past a certain point, the issue is that the hospital can’t, and it makes sense, even if it’s not ideal.

If someone is conscious and able to tell what day it is, the hospital deems them of sound mind, even if they warn the patient and family members they will die if released and return home to do the same things again. The only time a POA or Medical Directive can take effect is that if the patient is on a ventilator or otherwise completely incapacitated.

There is something called emergency guardianship, and I think it’s time to approach that just to ensure that she goes to rehab or a nursing home for a week or two to get stable, instead of in and out of the ICU every week, or like Dr. Mohammad said, she may not make it until Christmas

Edit:

I’ve had to block her.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Terms of Service — Closed Site / No-Access Agreement – YOUR IP ADDRESS, BROWSER AGENT, OS, ETC IS BEING FINGERPRINTED AND LOGGED

Last Updated: August 30, 2025
Operator: The operator of this website (“we,” “us,” “our”)
Site: This website (the “Site”)

0) Private Property Notice; No Public License

This Site is private, closed, and not open to the public. No license to access, view, retrieve, copy, store, save, record, or otherwise use the Site or its content (“Content”) is granted. You are not authorized to access or use the Site unless you are an individual expressly and specifically authorized in writing by us, and you access the Site only in accordance with that written authorization.

If you are not expressly authorized in writing, you must leave now and must not load, render, or otherwise access any page, media, API endpoint, or file.

1) Acceptance; Access Is a Breach Unless Pre-Authorized

By attempting to connect to the Site (including DNS lookup, TCP/IP connection, HTTP(S) request, or other protocol-level retrieval), you represent and warrant that you possess written authorization from us. If you do not, every access attempt constitutes a breach of this Agreement and trespass to our systems and resources. You agree that simply viewing any page without prior written authorization violates these Terms.

2) Definitions

  • Access means any technical act that requests, receives, renders, downloads, stores, caches, proxies, indexes, crawls, archives, screenshots, recordings, transcodes, transforms, or otherwise interacts with the Site or Content, including automated, manual, or assisted methods.
  • Content includes all text, images, audio, video, code, metadata, databases, models, logs, files, APIs, and derivatives.
  • Authorized User means a person we have approved in writing, within the scope we specify.

3) Non-Access Covenant (Core Rule)

Except for Authorized Users acting strictly within their written scope, you must not:

  1. View, read, watch, listen to, display, or render any Content.
  2. Copy, save, download, store, cache, print, screenshot, screen-record, transcribe, or archive any Content.
  3. Scrape, crawl, spider, probe, mine, harvest, index, or monitor the Site or traffic to/from it.
  4. Republish, redistribute, mirror, frame, embed, deep-link, or hotlink any part of the Site.
  5. Circumvent or attempt to circumvent access controls, rate limits, geo/IP blocks, robots directives, or consent gates.
  6. Use automated tools (including bots, headless browsers, RPA, and scripts) or third-party archiving/translation tools.
  7. Transmit, expose, or disclose any Content to others, including by AI/ML ingestion, summaries, or data extraction.
  8. Create derivative works from, or use any portion of, the Content.
  9. Commercialize, analyze, or evaluate the Content in any way.

4) Professional/Adverse-Use Prohibition (Deterrent Clause)

To the maximum extent permitted by law, you must not access the Site for any legal, regulatory, investigatory, insurance, expert-witness, e-discovery, claims, competitive-intelligence, or adverse-litigation purpose against us or our stakeholders. If you are an attorney, investigator, regulator, adjuster, expert, consultant, journalist, archivist, or similar professional—or acting at their direction—you are not permitted to access this Site without our prior written consent. Any such access is unauthorized and breaching.

5) AI/ML and Model-Training Ban

You must not use any Content (including metadata, layout, or user interactions) to train, fine-tune, evaluate, or improveany model or dataset; to generate embeddings; to perform feature extraction; or to create synthetic data. You must not provide the Content to third parties (including vendors) for any of the foregoing purposes.

6) No Caching, Archiving, or Indexing

You must not use or enable caching, proxying, content acceleration, or archiving (including but not limited to search engines, the Internet Archive, Common Crawl, or corporate archives). You must not add, submit, or permit the Site or any URL to be indexed, translated, summarized, or previewed by any service.

7) Security; Circumvention; Monitoring

You must not probe, scan, or test the vulnerability of the Site or any related network. We may employ technical measures (WAF, rate-limits, token gates, robots directives, canary content, and access logs). By attempting access, you consent to such measures and to our use of logs for enforcement.

8) Ownership; No License

All Content is owned by us or our licensors. No express or implied license is granted. Unauthorized access never creates a license.

9) Confidentiality by Conduct (Deterrent Clause)

All Content is deemed confidential and proprietary. If you obtain access without written authorization, you agree to treat all Content as confidential information, to immediately cease access, not disclose or use it, and to delete all copies (including caches, screenshots, and notes).

10) Takedown; Deletion; Return/Destruction

Upon our request—or upon learning you lack authorization—you must immediately stop access and permanently delete all Content in your possession or control (including backups, caches, logs, and derivative materials) and certify deletion in writing.

11) Accounts; Scope; Revocation

Any written authorization is personal, revocable, non-transferable, limited in scope, and may be revoked at any time. Sharing credentials or exceeding scope constitutes unauthorized access.

12) Remedies; Irreparable Harm; Injunction

Any breach causes irreparable harm for which monetary damages are inadequate. We may seek temporary, preliminary, and permanent injunctive relief, specific performance, expedited discovery, and equitable remedies without bond to the extent allowed by law, in addition to all other remedies.

13) Statutory & Common-Law Claims Preserved

We reserve all claims and defenses, including under computer-misuse/trespass statutes, copyright and trade-secret laws, contract and tort (including trespass to chattels), and unfair-competition law.

14) Indemnification

You will defend, indemnify, and hold harmless us and our affiliates, officers, directors, employees, and agents from any claims, liabilities, damages, losses, and expenses (including reasonable attorneys’ fees) arising from or related to your unauthorized access or use.

15) Disclaimers

THE SITE AND CONTENT ARE PROVIDED “AS IS” AND “AS AVAILABLE.” WE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, AVAILABILITY, AND SECURITY.

16) Limitation of Liability

TO THE MAXIMUM EXTENT PERMITTED BY LAW, WE WILL NOT BE LIABLE FOR INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, EXEMPLARY, OR PUNITIVE DAMAGES, OR FOR ANY LOSS OF DATA, PROFITS, GOODWILL, OR REPUTATION, ARISING FROM OR RELATED TO ANY ACCESS OR ATTEMPTED ACCESS. OUR AGGREGATE LIABILITY, IF ANY, SHALL NOT EXCEED US$100.

17) Termination; Survival

Any attempted access by an unauthorized person immediately terminates any putative license. Sections 3–17 survive termination.

18) Governing Law; Venue; Dispute Resolution

These Terms are governed by the laws of the State of Indiana, without regard to conflict-of-laws rules. You consent to exclusive jurisdiction and venue for injunctive or equitable relief in the state and federal courts located in Indianapolis, Indiana. At our election, all other disputes shall be resolved by binding arbitration under the AAA Commercial Arbitration Rules before a single arbitrator in Indianapolis, Indiana. Each party bears its own fees and costs, except as otherwise provided by law or these Terms.

19) Changes

We may modify these Terms at any time by posting an updated version with a new “Last Updated” date. Continued attempts to access after changes constitute acceptance.